Вы находитесь на странице: 1из 3

Engineering and Scientific International Journal (ESIJ) ISSN 2394-7187(Online)

Volume 3, Issue 2, April– June 2016 ISSN 2394 - 7179 (Print)

Literature Review: Cloud Computing–Security Issues,


Technologies and Challenges
D.Jothipriya#1, Dr. A.Akila*2
1
M.Phil. Scholar, Dept of Computer Science, Vels University, Chennai
jothi.gopal@gmail.com
2
Assistant Professor, Dept of Computer Science, Vels University, Chennai

Abstract— Cloud computing is drastically increasing so to computing platform, naturally consisting of OS,
make cloud computing more popular the very first step for Programming Language execution environment, database
the organization is to identify exact place where the cloud and web servers. The developers can develop and run their
related threats lie. The changes from server to service based program results on cloud platform with no cost and
technology brought a increasing change in computing difficulty.[9]. Users uses these platforms which is being
technology. The developments have created new security Integrated Development Environment (IDE), so as it
vulnerabilities, including security problems whose full consists the editor, compiler, build and deploy features to
impressions are still rising. This paper presents an develop their applications.
overview and study of cloud computing, with several
security threats, security problem, currently used cloud
technologies.[1],[4]

Keywords— Cloud Computing; Threats; Security problems;


Service Models.

1. Introduction
Cloud computing is collection of resources that are
being given on demand. Cloud computing gives new ways
to provide services. Business is operated using these new,
technical opportunities. Cloud computing is a collection of
resources and services provided by provider through
internet. As the cloud computing is rapidly growing this
also leads to major security problems. Lack of security is
the only threat in wide adoption of cloud computing. The
drastic growth of cloud computing has brought many
security challenges for users and providers.[5],[7]

2. Cloud Service Models Fig.1: Cloud Service Model

2.1 Cloud Software-as-a-Service 2.3 Cloud Infrastructure-as-a-Service

It is a software distribution scheme which gives access The IaaS provider gives the access of the services of
the software and its functions distantly as a web-based servers, storage, OS and other networking. The end user
service. SaaS provides organizations to get into business takes on these provided services based on their needs and
functionality a low cost normally less than paying for pay for what they have used. The user is able to deploy and
licensed applications in view of the fact that SaaS charges run any software, which comprise Operating Systems,
are built on a monthly fee. As the software is hosted applications [2] Flexibility and scaling are the rights of the
remotely users need not pay for additional hardware. SaaS end user, not the supplier. Amazon Elastic Compute Cloud
removes all opportunities for organisation to handle the is an IaaS model that facilitates growing compute volume,
installation, set-up, daily storage and maintenance.[8] on demand, in the cloud. It allows users to influence
Amazon's infrastructure with no pay in advance
2.2 Cloud Platform-as-a-Service investments. Amazon EC2 decreases the clock needed to
control of and boot latest server copies and allow users to
The capability given to the users to deploy onto the immediately increase space – equally up and down as their
cloud infrastructure. PaaS model, cloud provider brings a computing needs differ.

19
Engineering and Scientific International Journal (ESIJ) ISSN 2394-7187(Online)
Volume 3, Issue 2, April– June 2016 ISSN 2394 - 7179 (Print)

3. Cloud Deployment Models We should say that Security and privacy are the key
challenging problems in the cloud computing. Here are
some security problems, we have presented in this paper.

Fig.3: Cloud Security issues


Fig.2 :Cloud Computing Types

3.1 Public Cloud 4.1 Data Confidentiality Problem

A cloud is to be titled as public cloud when the services Confidentiality is a group of rules that bounds access
(like applications, storage) are being given through internet limits to certain kinds of information. It means that users
that are available to anyone who can access it publically. data are to be kept secret from both cloud provider and
The identified benefits of the Public cloud may considered other users who is using the service. We must make sure
as pay based usage mode or any other purchasing that user's private or secret information should not be used
schemes .[6] by anyone in the cloud computing, including application,
OS, CPU and physical memory. It is clear that user's
3.2 Private Cloud confidential data is provide to service provider on the
following situation only[12].
The private cloud is consider as an infrastructure which
provides the services to one organization, whether it is A. Circumstance 1
managed internally or by a third party.
The first situation where user's Information may be
3.4 Community Cloud produced when service provider knows where their private
information is located in the cloud systems.
It comprises sharing of infrastructure between
organizations of same group of people. B. Circumstance 2

3.5 Hybrid Cloud The second situation where user's message may be
produced when service provider has the right to access and
The hybrid cloud is a collection of both private and collect user's private information in the cloud systems.
public cloud options.That remains unique entities but is
collectively by the uniform or proprietary application. C. Circumstance 3

The third situation where user's message may be


4. Cloud Security Issues produced when service provider can find out the meaning
of user's information[11] .These are the following
While cost and ease of use are the two main advantages circumstances for the service provider to access the user's
of the cloud computing, there are some major problems that information and must know the place of the data in the
need to be noticed when allowing crucial application and cloud computing [5]. The service provider know where the
secret data to public and shared in cloud environment[14]. user's data is stored and they can access the data.

20
Engineering and Scientific International Journal (ESIJ) ISSN 2394-7187(Online)
Volume 3, Issue 2, April– June 2016 ISSN 2394 - 7179 (Print)

4.2 Data Availability Issue 5. Conclusion

When storing data at distant location which is owned by In this paper we have analysed fundamental concepts of
others, data owner may find the issue of system failure of cloud computing and security issues in the cloud
the service provider. And if cloud stops working, data will computing. The privacy and integrity of data are the major
not be available because it is handled by one service security issues. In the cloud the users informations are
provider. Threats to data availability are overflow attacks publically stored but they don't know where it is stored and
causes refusal of service and Direct /Indirect (DOS) attack. also the exact location of the data.The data stored has a
The Service Level Agreement(SLA) will not be met when risk of being utilized by malicious person during storage
some services are not available[13]. as well as transmission

4.3 Data Integrity Issue References

It is the ―completeness‖ of the data which is the basic [1] Mell, Peter, and Timothy Grance. "The NIST definition of cloud
computing (draft)." NIST special publication 800.145 (2011): 7.
and central needs of technology . Integrity of data and [2] Pearson, Siani, Yun Shen, and Miranda Mowbray. "A privacy
storing of data are very critical and important for the cloud. manager for cloud computing." Cloud Computing. Springer Berlin
It proofs the validness and consistency of the data. Heidelberg, 2009. 90-106.
Therefore cloud storage is becoming famous for the [3] Zhang, Qi, Lu Cheng, and Raouf Boutaba. "Cloud computing:
state-of-the-art and research challenges." Journal of internet
outsourcing of daily management of data[4]. The cloud services and applications 1.1 (2010): 7-18.
provider should give assurance to the user that if their data [4] Voorsluys, William, James Broberg, and Rajkumar Buyya.
is stored in the cloud surely . "Introduction to cloud computing." Cloud Computing (2011): 1-41.
[5] Wang, Lizhe, et al. "Cloud computing: a perspective study." New
Generation Computing 28.2 (2010): 137-146.
4.4 Data Security Problem [6] Iosup, Alexandru, et al. "Performance analysis of cloud computing
services for many-tasks scientific computing." Parallel and
When we talk about data storage in the cloud Distributed Systems, IEEE Transactions on 22.6 (2011): 931-945.
computing , the sensitive data of every organisation [7] Fernandes, Diogo AB, et al. "Security issues in cloud environments:
a survey."International Journal of Information Security (2013):1-58.
continues to be there within the organisation boundary . It [8] Chandrahasan, R. Kalaichelvi, S. Shanmuga Priya, and L.
can be solved by using some encryption techniques for the Arockiam. "Research Challenges and Security Issues in Cloud
protection of the data . The data protection needs to be Computing." International Journal of Computational Intelligence
implemented in order to secure data from the following and Information Security 3 (2012).
[9] Sen, Santanu Kumar, and Sharmistha Dey. "An Investigation
uncertainties[3]. towards Security Threats for Cloud Computing.
[10] Martin, S. Schrittwieser, et al. Dark clouds on the horizon. using
4.5 Trust Issue cloud storage as attack vector and online slack space‖. Proceedings
of the 20th USENIX conference on Security. San Francisco, CA,
USENIX Association.
Trust is also one of a major problem in cloud computing. [11] Gruman, Galen (2008-04-07). "What cloud computing really
Trust comes around assurance and confidence that people, means". InfoWorld. Retrieved 2009-06-02.
data, objects, information will perform in projected [12] Mao, Ming; M. Humphrey (2012). "A Performance Study on the
VM Startup Time in the Cloud". Proceedings of 2012 IEEE 5th
way.When any user stores their data on cloud storage, they International Conference on Cloud Computing (Cloud2012): 423.
must believe the cloud provider so that they don't be afraid doi:10.1109/CLOUD.2012.103. ISBN 978-1-4673-2892-0.
to put their data on cloud, like we are trusting and using [13] Dario Bruneo, Salvatore Distefano, Francesco Longo, Antonio
Gmail server, yahoo server. Therefore cloud provider must Puliafito, Marco Scarpa: Workload-Based Software Rejuvenation
in Cloud Systems. IEEE Trans. Computers 62(6): 1072–1085
provide some techniques to solve with the trust problem (2013)[1]
and build trust with the users so that many people will be [14] "Defining and Measuring Cloud Elasticity". KIT Software Quality
using cloud computing without having any doubt[2]. Departement. Retrieved 13 August 2011.

21

Вам также может понравиться